Hello,
Currently attacks occurs using a vulnerabiliy in a vulnerable FCKEditor version of filemanager, as shipped with some ColdFusion servers:
http://isc.sans.org/diary.html?storyid=6715
The vulnerability is about sending a PHP file (as test.php) BUT using a ZIP header as the beginning of the file to bypass the security check, and after put the PHP (or ASP, CFM) code in the file. In this case, the PHP (or ASP, CFM) is evaluated on the server.
This vulnerability is known since October 2008:
http://cve.mitre.org/cgi-bin/cvename.cg ... -2008-6178
http://www.securityfocus.com/bid/31812/info
Unfortunately, as there is no security section on the FCKeditor Web site (sorry if i miss it, in this thanks for the URL), does anyone know if:
- Is this vulnerability fixed in recent FCKEditor versions ?
- Has a patch been distributed ?
- Is it possible to restrict using internal FCKeditor command access to the filemanager connector, instead of disable it for the moment ?
Regards.
Fri, 07/03/2009 - 15:03
#1
Re: FCKEditor and current vulnerability exploited in the Wild
Please use the contact form to send us a message about discovered vulnerabilites.
Whenever security issues are fixed, they are mentioned here: http://www.fckeditor.net/whatsnew.
Wiktor Walc
CTO, CKSource - http://cksource.com
--
Follow CKEditor on: Twitter | Facebook | Google+
Re: FCKEditor and current vulnerability exploited in the Wild
Re: FCKEditor and current vulnerability exploited in the Wild
Re: FCKEditor and current vulnerability exploited in the Wild
That being the case, does the security issue still exist if the file browser is enabled in config.ext yet LinkUpload, ImageUpload and FlashUpload are all disabled in fckconfig.js?
Thanks
Re: FCKEditor and current vulnerability exploited in the Wild
They will go directly against your connector, and if you have left it enabled for everyone, then you are running a high risk.